About me

Bruno ScapBruno Scap

I'm have been working in the enterprise Information Technology field for almost 20 years. I was on the Internet when:

  • There was no Yahoo! and Google
  • Web browsers were text-based
  • Getting online was an engineering feat
  • Receiving an email was as exciting as receiving a written letter

In the past two decades - and in the years before while in college studying Computer Science - I've been exposed to a wide variety of technologies.

My technical focus is technology infrastructure: large scale systems, storage, backup, security, networks, cloud, high performance computing, virtual infrastructure and public and private clouds.

After graduating from college I moved to New York City and have lived there ever since.

I've worked for a few different companies in various industries (in order):

  • One of the first Silicon Alley content companies
  • An 18-person startup that ultimately failed (I got out on time)
  • A mid-sized direct email marketing company
  • A global intergovernmental organization
  • A private Ivy League research university

Silicon Alley is an area of high tech industries originally centered around the Flatiron district in Midtown Manhattan, New York City. The term was coined in the 1990s during the dot-com boom as a reference to Silicon Valley, the tech center in California. The New York tech industry is even bigger today and has spread outside of Manhattan.

I hold a Bachelor of Science in Computer Science from California State University, and Masters of Science in Technology Management from Columbia University, and Computer Science from Pace University, respectively.

Ordinary people, like us, are increasingly left without guidance when it comes to computer security and privacy. Large corporations are rapidly developing technology products and services without properly educating us - and often even not caring - on how to use them in a secure way.

I started this website to share my knowledge and experience from working in the corporate enterprise technology world and help you apply it to your own personal technology.

The good news is, even with all the new and changing technology, how we approach security hasn't changed much in hundreds, or even thousands of years. The key is to know how to apply it today. This is what this website is about.

Technology vs. Security

Technology helps us be more productive. It makes our everyday lives more convenient and fun. We are in the middle of a technology revolution.

Technology enables us to:

  • Communicate at a speed of light, with anyone, in any way and at any time
  • Order anything we want, from food to movie tickets, toilet paper and cars
  • Work from anywhere in the world
  • Listen to music, watch movies and stream our own events on social media
  • Organize our lives to be more productive

Technology innovation is moving at a rapid pace. Just as we learn how to use our current computer or phone, a new one is available with even more features.

Technology is making our lives better. Yet our computers, smart phones and personal information are not any more secure.

David vs. Goliath

As manufacturers race to release new products and services, they are not as concerned with their security. They are not trying too hard to protect our privacy and personal information and data. This is because no one holds them accountable.

If someone breaks into your computer or phone and steals your personal information to open a credit card in your name and order a lot of big-ticket items, no one is held responsible. You have to jump through hoops to recover your stolen identity. The credit card company will remove the fraudulent charges, but they will not help you fix your credit score.

We cannot live our lives without computers today. To have one is a basic need. And to have a secure one is more important than ever.

Information And Tools

You can only protect your computer, smart phone and home network if you are aware of the dangers and know how to defend your digital turf.

I've been studying and implementing computer security in the corporate technology world for almost 20 years. I'm excited to share my knowledge and experience with you to help you apply it to your own personal technology.

Security should not be an afterthought, it should be part of product design. But most product designs (even in the business and corporate world) are only focused on features. Most companies don't invest enough in security.

We don't control the initial security of the products we buy - computers, tablets, phones and smart home devices. But we can do our best to secure them afterwards, to protect our personal information and data stored on them.

  1. Computer Security
  2. About Me